Story image

Adopt a cyber attacker’s point of view to protect data

28 Jun 18

Technology analysis organisation ISACA and SecurityScorecard have announced a joint research paper, Continuous Assurance Using Data Threat Modeling, to provide enterprises with guidance in adopting an attacker’s point of view to help account for data.

With a step-by-step guide to apply application threat modelling principles to data, enterprises can now establish a baseline for monitoring ongoing data risk over time.

ISACA is a global association that aims to help individuals and enterprises achieve the positive potential of technology.

The organisation equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organisations.

ISACA has a presence in more than 188 countries, including 217 chapters worldwide and offices in both the United States and China.

Enterprises are challenged to move the process of accounting for data in a structured, systematic way higher on the list of priorities.

One option to accomplish this challenge is by applying application threat modelling principles to data (data threat modelling).

Application threat modelling provides value by allowing application security specialists to systematically evaluate an application from an attacker’s point of view.

By doing this, an analyst can methodically analyse an application to identify and map threats that the application is likely to encounter in post-deployment conditions.

“To support a continuous view of anything, there are two things needed: something to measure and a way to perform that measurement frequently or in an ongoing way,” says SecurityScorecard compliance head Fouad Khalil.

SecurityScorecard's vision is to create a new language for measuring and communicating security risk.

With cloud solutions becoming an increasingly integral part of the security technology stack, SecurityScorecard recognised the need to address third- and fourth-party risk as well as better understand the security capabilities of their business partners.

SecurityScorecard is backed by leading venture capital investors including Sequoia Capital, GV, NGP Capital, Evolution Equity Partners, Boldstart Ventures, AXA Venture Partners among others.

“By implementing this continuous assurance process, an enterprise can be notified as changes happen that impact its understanding of the threats to their applications and, ultimately, their data.”

The ISACA and SecurityScorecard paper provides 11 key questions to ask to implement continuous assurance related to threat understanding, including these five:

  • What are the specific indicators the enterprise will use to measure changes to the threat environment?
  • How will the enterprise account for entities in the supply chain?
  • What instruments are in place to evaluate control performance at third parties?
  • Who is responsible for maintaining and monitoring the view that is put together?
  • What is the amount the enterprise is willing to invest in this?

“Organisations often struggle with data protection that feels out of control—and this guide helps bring clarity to the chaos,” says ISACA content strategy director Karen Heslop.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.